Hosain et al., 2025 - Google Patents
XAI-XGBoost: an innovative explainable intrusion detection approach for securing internet of medical things systemsHosain et al., 2025
View HTML- Document ID
- 12084232078982091122
- Author
- Hosain Y
- Çakmak M
- Publication year
- Publication venue
- Scientific Reports
External Links
Snippet
Abstract The Internet of Medical Things (IoMT) has transformed healthcare delivery but faces critical challenges, including cybersecurity threats that endanger patient safety and data integrity. Intrusion Detection Systems (IDS) are essential for protecting IoMT networks, yet …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Charmet et al. | Explainable artificial intelligence for cybersecurity: a literature survey | |
Ozkan-Okay et al. | A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions | |
Al Shorman et al. | Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection | |
Alqahtani et al. | Cyber intrusion detection using machine learning classification techniques | |
Liu et al. | FAIXID: A framework for enhancing AI explainability of intrusion detection results using data cleaning techniques | |
Omer et al. | A novel optimized probabilistic neural network approach for intrusion detection and categorization | |
Xuan et al. | A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic | |
Sahar et al. | Deep learning approach-based network intrusion detection system for fog-assisted iot | |
Alshuaibi et al. | Machine learning for cybersecurity issues: A systematic review | |
Wang et al. | Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM | |
Asmar et al. | Integrating machine learning for sustaining cybersecurity in digital banks | |
Zegarra Rodriguez et al. | Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection | |
Hammad et al. | T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems | |
Maseer et al. | Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges | |
Sun et al. | GNN-IDS: Graph neural network based intrusion detection system | |
Chakraborty et al. | Detection and classification of novel attacks and anomaly in IoT network using rule based deep learning model | |
Aldaej et al. | Ensemble technique of intrusion detection for IoT-edge platform | |
Talukder et al. | A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction | |
Kaushik et al. | Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection | |
Hosain et al. | XAI-XGBoost: an innovative explainable intrusion detection approach for securing internet of medical things systems | |
Das et al. | Integration of machine learning with cybersecurity: applications and challenges | |
Rajasekar et al. | Security analytics | |
EL Asry et al. | A robust intrusion detection system based on a shallow learning model and feature extraction techniques | |
Uddin et al. | usfAD based effective unknown attack detection focused IDS framework | |
Logeswari et al. | An improved synergistic dual-layer feature selection algorithm with two type classifier for efficient intrusion detection in IoT environment |